Tag: okta
-
10. Okta Businesses at Work Report – Sicherheitsrisiko Unternehmens-Apps
by
in SecurityNews
Tags: oktaFirst seen on security-insider.de Jump to article: www.security-insider.de/sicherheitsrisiko-unternehmens-apps-a-e5d1d68b08b34f8957016bd29541a1b2/
-
How to Improve Okta Security in Four Steps
by
in SecurityNewsWhile Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts.Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this First…
-
Okta-Report enthüllt signifikant gesteigerte Erkennungsrate von Cyberbedrohungen in Deutschland
by
in SecurityNewsBerichte über Cybersicherheitsvorfälle in Deutschland haben drastisch zugenommen. Einrichtungen der kritischen Infrastruktur meldeten im Jahr 2024 insgesamt 769 solcher Vorfälle an das Bundesamt für Sicherheit in der Informationstechnik (BSI) ein Anstieg um rund 43 Prozent im Vergleich zum Vorjahr. Noch beunruhigender ist, dass 80 Prozent aller Cyberangriffe auf kompromittierte Online-Identitäten zurückzuführen sind. In diesem […]…
-
Who’s using what: Results from the 2025 Okta Businesses at Work report
by
in SecurityNews
Tags: oktaFirst seen on scworld.com Jump to article: www.scworld.com/resource/whos-using-what-results-from-the-2025-okta-businesses-at-work-report
-
Okta Exec Sheds Light On Trump’s Cybersecurity Strategy
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/okta-exec-sheds-light-on-trumps-cybersecurity-strategy
-
CrowdStrike and Okta reach AWS Marketplace milestones
by
in SecurityNewsSecurity players underline the volume of sales that can be generated by distributors, MSPs and ISVs on the AWS Marketplace platform First seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366619940/CrowdStrike-and-Okta-reach-AWS-Marketplace-milestones
-
7 key trends defining the cybersecurity market today
by
in SecurityNews
Tags: access, ai, attack, cisco, ciso, cloud, compliance, control, crowdstrike, cyber, cybersecurity, data, defense, detection, endpoint, fortinet, gartner, google, governance, group, ibm, intelligence, microsoft, ml, network, okta, resilience, risk, service, siem, startup, strategy, technology, threat, tool, vulnerability, zero-trustMarket leaders are gaining share: The cybersecurity market has a dizzying number of single-product vendors, but a handful of powerful platform providers have risen above the pack and are gaining market share.According to research firm Canalys, the top 12 vendors benefited the most from customers taking early steps to transition to platforms. Collectively, they accounted…
-
Die besten XDR-Tools
by
in SecurityNews
Tags: attack, business, cloud, computing, container, crowdstrike, cyberattack, detection, edr, endpoint, firewall, google, Hardware, ibm, identity, incident response, infrastructure, mail, malware, marketplace, microsoft, ml, network, office, okta, risk, security-incident, service, siem, soar, software, tool, vulnerabilityLesen Sie, worauf Sie in Sachen XDR achten sollten und welche Lösungen sich in diesem Bereich empfehlen.Manuelles, siloartiges Management ist in der modernen IT-Welt unangebracht. Erst recht im Bereich der IT-Sicherheit: Der Umfang von modernem Enterprise Computing und State-of-the-Art-Application-Stack-Architekturen erfordern Sicherheits-Tools, die:Einblicke in den Sicherheitsstatus von IT-Komponenten ermöglichen,Bedrohungen in Echtzeit erkennen, undAspekte der Bedrohungsabwehr automatisieren.Diese…
-
Customer Identity & Access Management: Die besten CIAM-Tools
by
in SecurityNews
Tags: access, ai, api, authentication, business, cloud, compliance, cyberattack, fido, fraud, gartner, iam, ibm, identity, infrastructure, intelligence, login, marketplace, microsoft, okta, privacy, risk, saas, service, toolWir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt.Customer Identity & Access Management (CIAM) bildet eine Unterkategorie von Identity & Access Management (IAM). CIAM wird dazu eingesetzt, die Authentifizierungs- und Autorisierungsprozesse von Applikationen zu managen, die öffentlich zugänglich sind, beziehungsweise von Kunden bedient werden.Geht es darum, die für Ihr…
-
Die besten IAM-Tools
by
in SecurityNews
Tags: access, ai, api, authentication, automation, business, ciso, cloud, compliance, endpoint, gartner, governance, iam, identity, infrastructure, login, mfa, microsoft, okta, password, risk, saas, service, tool, windows, zero-trustIdentity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter und -Tools.Identität wird zum neuen Perimeter: Unternehmen verlassen sich immer seltener auf die traditionelle Perimeter-Verteidigung und forcieren den Umstieg auf Zero-Trust-Umgebungen. Sicherer Zugriff und Identity Management bilden die Grundlage jeder Cybersicherheitsstrategie. Gleichzeitig sorgt die Art und Weise, wie sich…
-
Don’t Overlook These 6 Critical Okta Security Configurations
by
in SecurityNewsGiven Okta’s role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture.With over 18,000 customers, Okta serves as the cornerstone of identity governance and security for…
-
Okta Lays Off 180 In Latest Round Of Cutbacks
by
in SecurityNewsOkta has disclosed a major round of layoffs for the third year in a row, with the announcement it will cut 3 percent of its staff. First seen on crn.com Jump to article: www.crn.com/news/security/2025/okta-lays-off-180-in-latest-round-of-cutbacks
-
Okta Carries Out Another Round of Layoffs, Axing 180 Workers
by
in SecurityNews3rd Round of Layoffs in 3 Years Comes as Rival CyberArk Surpasses Okta’s Valuation. Okta will execute its third round of layoffs in three years, cutting 180 employees to reallocate resources toward priorities to drive growth. The San Francisco-based identity security giant on Tuesday shared plans to reduce its staff by 3% in what has…
-
10 top XDR tools and how to evaluate them
by
in SecurityNews
Tags: ai, attack, automation, business, cloud, computing, container, corporate, credentials, data, defense, detection, edr, email, encryption, endpoint, finance, firewall, google, guide, Hardware, iam, ibm, identity, incident response, infrastructure, intelligence, malicious, malware, marketplace, microsoft, mitigation, network, office, okta, open-source, organized, risk, security-incident, service, siem, skills, soar, software, spam, technology, threat, tool, training, vulnerability, zero-dayLittle in the modern IT world lends itself to manual or siloed management, and this is doubly true in the security realm. The scale of modern enterprise computing and modern application stack architecture requires security tools that can bring visibility into the security posture of modern IT components and integrate tightly to bring real-time threat…
-
SOAR buyer’s guide: 11 security orchestration, automation, and response products, and how to choose
by
in SecurityNews
Tags: access, ai, api, attack, automation, business, chatgpt, cisco, cloud, compliance, container, cybersecurity, data, detection, edr, endpoint, firewall, fortinet, gartner, google, group, guide, Hardware, ibm, incident response, infrastructure, intelligence, jobs, LLM, malware, mandiant, marketplace, microsoft, mitigation, monitoring, network, okta, risk, saas, security-incident, service, siem, soar, soc, software, technology, threat, tool, training, vulnerability, vulnerability-management, zero-daySecurity orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR have bled into other tools. For example, responses can be found now in endpoint detection and response (EDR) tools. Orchestration is now a joint…
-
Microsoft, Ping, Okta Dominate Access Management Gartner MQ
by
in SecurityNewsAccess Management Leaders Remain Unchanged as Customer Identity Cases Proliferate. Advances in customer identity around better user experience, strong authentication, and centralized identity processes have driven rapid growth in the access management market. The space by grew 17.6% to $5.85 billion in 2023 as organizations increasing look to replace homegrown CIAM solutions. First seen on…
-
Organizations Warned of Rise in Okta Support Phishing Attacks
by
in SecurityNewsOkta has warned customers that it has seen an increase in phishing attacks impersonating its support team. The post Organizations Warned of Rise in Okta Support Phishing Attacks appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/organizations-warned-of-rise-in-okta-support-phishing-attacks/
-
The Security Interviews: Stephen McDermid, Okta
by
in SecurityNews
Tags: oktaOkta regional chief security officer for EMEA sits down with Dan Raywood to talk about how Okta is pivoting to a secure-by-design champion First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366617120/The-Security-Interviews-Stephen-McDermid-Okta
-
Security leaders top 10 takeaways for 2024
by
in SecurityNews
Tags: access, ai, attack, automation, best-practice, breach, business, ciso, cloud, compliance, corporate, crowdstrike, cybercrime, cybersecurity, data, deep-fake, detection, email, finance, fraud, governance, group, guide, hacker, identity, incident response, infosec, ISO-27001, office, okta, phishing, privacy, programming, regulation, risk, risk-management, saas, security-incident, service, software, startup, strategy, technology, threat, tool, training, vulnerabilityThis year has been challenging for CISOs, with a growing burden of responsibility, the push to make cybersecurity a business enabler, the threat of legal liability for security incidents, and an expanding attack landscape.As the year comes to a close, CISOs reflect on some of the takeaways that have shaped the security landscape in 2024.…
-
How to secure third parties and spot fake job applicants: Okta’s verification tips
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/resource/how-to-secure-third-parties-and-spot-fake-job-applicants-oktas-verification-tips
-
Okta Launch Week bringt neue Lösungen und Updates in EMEA
by
in SecurityNewsDurch die zuverlässige Kundenauthentifizierung werden User dazu befähigt, Transaktionen in Echtzeit zu überprüfen und zu genehmigen. Das integrierte F… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/okta-launch-week-bringt-neue-loesungen-und-updates-in-emea/a38185/
-
Okta und OpenID Foundation forcieren neuen Identitätsstandard IPSIE
by
in SecurityNewsDer neue Identitätssicherheitsstandard Interoperability Profile for Secure Identity in the Enterprise (IPSIE) zielt darauf ab, die Identitätssicherhei… First seen on infopoint-security.de Jump to article: www.infopoint-security.de/okta-und-openid-foundation-forcieren-neuen-identitaetsstandard-ipsie/a38677/
-
FBI pierces ‘anonymity’ of cryptocurrency, secret domain registrars in Scattered Spider probe
by
in SecurityNewsThe US Justice Department on Wednesday announced the arrest of five suspected members of the notorious Scattered Spider phishing crew, but the most interesting part of the case was a US Federal Bureau of Investigation (FBI) document detailing how easily the feds were able to track the phishers’ movements and activities. In recent years, services that push…
-
Okta bolsters support to drive partner-first strategy
by
in SecurityNewsFirst seen on computerweekly.com Jump to article: www.computerweekly.com/microscope/news/366613893/Okta-bolsters-support-to-drive-partner-first-strategy
-
Okta schließt Sicherheitslücke: Bei langen Nutzernamen kein Passwort nötig
by
in SecurityNewsUnter bestimmten Bedingungen konnten sich Angreifer bei Okta ohne Passwort anmelden, sofern der zugehörige Nutzername mindestens 52 Zeichen lang war. … First seen on golem.de Jump to article: www.golem.de/news/okta-schliesst-sicherheitsluecke-bei-langen-nutzernamen-kein-passwort-noetig-2411-190433.html
-
Okta Fixes Auth Bypass Bug After 3-Month Lull
by
in SecurityNews
Tags: oktaFirst seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/okta-fixes-auth-bypass-bug-three-month-lull
-
Sicherheitslücke in Verify gibt Angreifern Zugriff auf Passwörter
In der Gerätezugriffssteuerungssoftware Verify von Okta können Angreifer eine Sicherheitslücke im Windows-Agent missbrauchen, um Passwörter abzugreife… First seen on heise.de Jump to article: www.heise.de/news/Okta-Sicherheitsluecke-in-Verify-gibt-Angreifern-Zugriff-auf-Passwoerter-10002764.html